Share Email Print
cover

Proceedings Paper

Secure encapsulation of nonsecure middleware
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Unceasingly developed and deeply exploited along with the software system, the variety of middlewares becomes more and more, they mutually affect each other in the complex way. These middlewares, because of the complex of the origin, are not extremely credible. So, before using these middlewares, we must understand the security features of them, for instance, the secret data cannot be leaked in the network. But, it is very difficult to confirm whether these middlewares have good security feature. The paper designs the encapsulations, which let these middlewares run under secure environment, and it provides the control of good granularity among the middlewares, the middleware and other system resources. The main part of this paper is to research the expression methods of the encapsulations, and we state and verify the security through these methods. This paper uses box-πcalculus to describe several kinds of encapsulations, and discuss the security that each encapsulation could guarantee.

Paper Details

Date Published: 10 September 2007
PDF: 10 pages
Proc. SPIE 6776, Broadband Access Communication Technologies II, 67760J (10 September 2007); doi: 10.1117/12.733248
Show Author Affiliations
Jian-min Zhao, Daqing Petroleum Institute (China)
Fang-zhou Zhang, Daqing Petroleum Institute (China)
Tian-ge Li, Daqing Oilfield Corp. Ltd. (China)


Published in SPIE Proceedings Vol. 6776:
Broadband Access Communication Technologies II
Raj Jain; Benjamin B. Dingel; Shozo Komaki; Shlomo Ovadia, Editor(s)

© SPIE. Terms of Use
Back to Top